3
privacy-policy,paged,page-template-default,page,page-id-3,paged-49,page-paged-49,qode-social-login-1.1.3,qode-restaurant-1.1.1,stockholm-core-1.1,select-child-theme-ver-1.1,select-theme-ver-5.1.8,ajax_fade,page_not_loaded,wpb-js-composer js-comp-ver-6.0.5,vc_responsive
Title Image

Privacy Policy

  • Sort Blog:
  • All
  • Cloud Computing
  • Disaster Recovery Management
  • IT Security Services
  • Managed IT Services
  • Office 365
  • Our Blogs
  • Press Releases
  • Uncategorized
  • VOIP Services

The Benefits of Centralizing Your Data and Infrastructure

Technology helps businesses of all kinds keep their operations running soundly, but depending on the way that it’s managed, it could have detrimental effects on your company. For example, if you have all kinds of solutions hosted on specific servers or workstations, you’re keeping them from being accessed by devices that aren’t connected to that specific network. Wouldn’t it be better if everything was centralized so that all of it could be accessed at a glance?

You should work toward centralization of your company’s IT assets as swiftly as possible, as it can provide your organization with enhanced accessibility and flexibility. If your business’ assets are all located in the same place, you might be surprised at how many possibilities are opened up, including the ability to access data anytime, anywhere, on any device.

Most businesses think of centralization as hosting company assets in one location where they can be accessed at any given point. For a lot of companies, this means implementing cloud computing of some sort. This includes taking your assets and moving them into a virtual environment, where they can be accessed by anyone who needs them. Examples of cloud computing include the following:

  • Constant accessibility: If you host applications in the cloud, you’re allowing for simplified access by approved individuals. This also means that you’ll be able to access these solutions on any connected device, providing on-the-go access for your busier employees.
  • User-based access: Your employees have different roles and responsibilities, and with these come varying degrees of data security clearance. You need to limit access to specific data depending on the user’s role. This keeps your employees from accessing data that they’re not supposed to.
  • Security: If all of your data is located in the same place, it becomes easier to protect. This security also needs to extend to any devices that have access to this data. If you can control security, your business can utilize centralized IT assets with minimal risk.

If your business wants to take full advantage of centralized IT, we recommend reaching out to Net Activity at 216-503-5150. We can consult you on any number of technology topics and help you maintain your infrastructure.

Threats are Changing – Are You Prepared to Change with Them?

Security is a part of business that is constantly changing and evolving. What worked ten years, five years, or even two years ago may not be relevant in today’s security environment. What are some of the major changes that your company can expect to see in the coming years? We’ll walk you through some of the ways that security will be changing in the foreseeable future, and what you can do about it.

The information here is gathered from a study performed by Cisco, which analyzed the findings of 3,600 data security professionals from organizations like Talos and other partners from all around the world.

Malware Grows More Autonomous
Early types of malware depended on the user clicking on a link to install it on the computer or workstation. Nowadays, malware is depending less and less on the user making a mistake and is instead becoming more network-based. A good example of this is ransomware, which could install on a single device and spread to the entire network. Cisco even imagines that this type of ransomware could take over the entire Internet.

Ransomware is About More than Just Money
The ransom involved with ransomware was the major reason why a lot of hackers would use it as their attack vector of choice, as it virtually guaranteed that they could make a profit off of an attack. People are too scared to lose their data, even on an individual level. Businesses would basically be forced to pay up or risk losing everything. However, the growing trend is that hackers aren’t as interested in money anymore–instead, they are interested only in the complete leverage they gain by stealing this data and holding it hostage.

Threats are Getting Better at Avoiding Detection
Ransomware has started to hide in encrypted traffic to avoid detection, which can make it much more difficult to identify and eliminate. Furthermore, through the use of cloud-based applications and services, any attacker can implement a command and control attack and hide it within normal traffic to obscure it.

Internet of Things Devices are a Problem
Devices that connect to the Internet have become a major problem for many businesses, especially considering how fast they have been implemented. IoT devices are often patched poorly, and they can create backdoors that allow for unauthorized access to your infrastructure. Furthermore, IoT endpoints are simply not secured properly, which makes them even more dangerous for your company network.

While security is a topic that is constantly changing, Net Activity can help your organization adapt and change to the times. To learn more, call us today at 216-503-5150.

Facebook Users Should Assume Their Data Has Been Scraped

First it was 55 million.  Then 77 million.  Now, it’s 2.2 billion, or pretty much every user on Facebook.  That’s how many people should assume that their public profile information has been scraped.

The conversation began when it came to light that Cambridge Analytica (a political research firm) had misused Facebook’s search function to scrap profile data for tens of millions of Facebook’s users to help the Trump campaign win the recent presidential election.

As research into the matter has continued. However, it has become clear that Cambridge Analytica wasn’t the only group misusing the search feature, and that before Facebook disabled it, more than two billion of Facebook’s users had seen their public profile information scraped.

Essentially, Facebook was used to paint a more complete picture of users to build a profile which could be sold on the Dark Web.

Starting with stolen phone numbers or addresses, hackers developed automated routines that fed this information into Facebook’s search function, enabling them to link these bits of information with the names and locations of specific people.  Having a more complete profile in hand made the data that much more valuable on the Dark Web, where it is currently being resold.

At 2.2 billion impacted users, it’s certain that this will be the year’s largest data breach. In fact, this one is likely to hold the world record for quite some time.

Facebook’s CEO, Mark Zuckerberg issued an apology to the company’s massive user base.

Mike Schroepfer, the company’s Chief Technology Officer, had this to say:

“Until today, people could enter another person’s phone number or email address into Facebook search to help find them.  This has been especially useful for finding your friends in languages which take more effort to type out a full name, or where many people have the same name.  However, malicious actors have also abused these features to scrape public profile information by submitting phone numbers or email addresses they already have through search and account recovery…we believe most people on Facebook could have had their public profile scraped in this way.

 

Get the Basics on 2-step and 2-factor Authentication

Cybersecurity is a vital component to businesses these days. You need to make sure that criminals cannot just hack into your network. When it comes to verifying users’ identity, there are two types of authentication used: two-step and two-factor. These two are so similar, many confuse one with the other. Learn the difference between the two, so you’re more knowledgeable on keeping your network secure.

If you want to improve your business’s cybersecurity for you and your customers, you should look at your authentication process. Two-step and two-factor authentication are two of the most commonly used options in cybersecurity. Many businesses use the terms two-step and two-factor authentication interchangeably. There are, however, subtle differences between the two.

Two-step authentication

A two-step authentication process requires a single-factor login (such as a password or biometric reading) as well as another similar type of login that is essentially sent to the user. For example, you may have a password for your first step and then receive a one-time-use code on your cell phone as the second step.

Two-step authentication adds an extra step in the verification process, making it more secure than single-step authentication (i.e., just the password). However, if a person or business is hacked, it won’t be enough to stop hackers from getting a hold of whatever they are looking for.

Two-factor authentication

On the other hand, there is two-factor authentication (sometimes referred to as multifactor authentication), which is significantly more secure. This type of authentication requires two different types of information to authenticate a user’s identity. For example, it could be a combination of a fingerprint or retinal scan as well as a password or passcode. Because the types of information are different, it would require a hacker a great deal more effort to obtain both forms of authentication.

The difference between the two

In essence, every two-factor authentication is a two-step authentication process, but the opposite is not true. With this information in mind, make sure that you are using the right type of authentication in your business to keep your company and customer information as secure as possible.

Your network needs the best security technology has to offer. The type of authentication you should use is just one of hundreds of choices that must be made to achieve that end. To take the stress out of securing and protecting your network, call us today for all the help you could ever ask for.

4 Backup Strategies That Really Protect Your Data

How does your business leverage data backup? Depending on the way your business functions and your specific needs, your data backup solution will vary from other organizations in your industry. Yet, one thing is absolutely certain, and it’s that your organization can’t afford to not implement some type of data backup system. In the event of a data loss scenario, you don’t want to be left wondering if you could have prevented it with a little proactive action.

Here are four topics that you will want to consider when designing and implementing a data backup system.

  1. Know What Data You’re Backing Up
    The biggest question that you will have to ask yourself is how much of your data you’re going to back up. Of course, the answer should always be “as much as possible.” Having said that, any legal obligations you have for specific compliance regulations must be prioritized, as left unchecked they could cost your business even more in lost revenue as you may be subject to fines and other expenses.
  2. Ensure Adequate Security Practices
    One of the most dangerous backup security practices is to keep them stored on an in-house infrastructure that’s vulnerable to being compromised by external threats. If a hacker can infiltrate your network, it’s likely that they can also infiltrate any unprotected data backups that you have in place. While it’s helpful to have an on-site backup that can be used in the heat of the moment, it’s more effective to keep your backups stored in an off-site data center that is encrypted and protected properly.
  3. Know Where Backups Are Stored
    One of the most critical parts of data backup is where you’re storing your backups. While it’s convenient to store them on-site, you risk damages to them. We recommend that you follow the 1-2-3 data backup rule. You keep three copies of your data in total–one on-site for easy access, and two off-site, either in a secure off-site data center or in the cloud. Remember, the best failsafe for your business’ data infrastructure is to have copies of it somewhere where they can reliably be restored.
  4. Test the Reliability of Your Systems
    Speaking of reliability, your backup systems are useless if they don’t work as intended. The last thing you want is to experience a data loss incident and then fail to restore your data when it’s needed most. You should frequently test your business’ backups so that you can be confident that they work as intended. Otherwise, you’re simply flirting with disaster, at the mercy of what boils down to luck and hope.

Net Activity, Inc. can equip you with a BDR solution that is designed to take frequent backups and store them in safe and secure off-site environment for rapid recovery in a moment’s notice. To find out how you can take advantage of this great solution, give us a call at 216-503-5150.

Keeping Your Business Safe: Building a Disaster Preparedness & Recovery Plan for Your Small Business

Did you know that almost 40% of small businesses do not re-open after a major natural disaster?

If you don’t want to fall victim to this statistic, you need a solid plan in place before disaster strikes.

Disasters and emergencies, whether natural or man-made, large or small, can have a dramatic impact on your company’s ability to keep your doors open and stay profitable.

So if you don’t already have one, then the time is now to create your disaster preparedness plan. Let’s take a look at the steps you should take right now to evaluate potential threats to your business and keep your company safe in an emergency.

First, Assess and Prioritize Potential Threats to Your Business

To go about creating a disaster preparedness plan for your business, you first have to understand the problem. Start by thinking about those obvious situations that could pose a risk, such as a fire, flood, or other major weather event.

But what about the less obvious disasters?

Do you have protections in place against cyber threats? Do you know what to do in case of an active shooter or other criminal situation? Are there threats of bodily injury or contamination posed as supplies or equipment at your workplace?

The wide range of potential disasters facing your business can be enough to leave you paralyzed. In reality, though, different scenarios pose a different level of risk to your individual business depending on your location, industry, and other factors.

If you’re not sure where to start assessing potential risks, take a look at the U.S. Small Business Administration’s risk assessment checklist. It will help you evaluate each potential risk factor by probability and impact in order to better prioritize your disaster recovery planning.

First thing to remember: prioritize human survival above all else.

In those critical first minutes when a natural or man-made disaster occurs, your immediate priority is always the protection of human life. So, the initial piece of your disaster preparedness plan should focus on creating and communicating procedures that will keep the people who make up your small business safe in an emergency situation.

Make sure to prepare for medical emergency situations. Workplace medical emergencies vary greatly depending on the disaster, type of job and the worksite. However, there are steps that can give you the upper hand in responding to a medical emergency. Encourage employees to take basic First Aid and CPR training. If it is feasible, offer on-site classes for your co-workers. You should also keep First Aid supplies in stock and easily accessible. Finally, encourage employees to talk about medical conditions that may require support or special care in an emergency.

Next identify your company’s specific emergency response requirements and objectives.

The exact needs of your emergency response plan depend upon your industry, size, location, and the highest priority risks you’ve identified for your business.

As you develop your business’s response plan, consider the requirements that may be put in place through these three key factors:

  1. Regulatory Requirements. Some aspects of your small business emergency action plan are dictated by local, state, or federal law. The U.S. Occupational Health and Safety Administration (OSHA), in particular, details required emergency response guidelines for any business with more than 10 employees. Fortunately, OSHA offers extensive online tools that can help you follow their standardized guidelines, including fire safety requirements, evacuation plan regulations, and expectations for emergency preparedness kits for your facility.

 

  1. Public Emergency Services. Local public services such as your city fire department and police force are committed to helping businesses craft a disaster preparedness plan. As you develop your business’ emergency response plan, consider reaching out to these entities to provide guidance, review the plans you put in place, and share contact information and communications procedures for outside community resources.

 

  1. Business-Specific Emergency Preparedness Needs. Although the guidance of regulatory bodies or emergency service personnel will go a long way toward helping you develop your emergency response plan, certain preparedness needs will be unique to your individual business and facility. To develop a plan that is actionable for your specific business and location, combine the guidelines of outside experts with what you know about your facility, your team, and how your business runs from day to day. Consider, for example, the layout of your facility, the work schedules of various personnel, and in particular the best course of action for any individuals with special needs.

To be most effective, your written emergency response plan should be clear, actionable, and well-organized, providing as much detail as possible while also allowing personnel to quickly access the information they need in any given scenario. Make sure to assign Team Roles as needed (i.e. Disaster Management, Network, Server and Applications) and provide clear delineation of roles and responsibilities of all teams.

We’ve got a great template to get you started crafting your plan:

Now it’s time to Run Company-Wide Emergency Response Simulations

Once you’ve completed a basic walk-through and implemented the feedback you receive, you’re ready for a more hands-on approach to testing your disaster preparedness plan. Depending on the size of your business, it’s wise to conduct live action drills at least once a year for each of the highest risk emergency scenarios you may face.

Then… make sure you finally…

Test Your Disaster Recovery Process & Plan

This is where you plan and walk through the policies and procedures you will be following when your IT services have been disrupted for any of the emergency scenarios we have discussed here.

Now we want to bring the focus of the plan to restoring all affected business processes as quickly as possible, either by bringing disrupted services back online or by switching to a contingency system.

This portion of your DR plan should take into account the following:

  • IT services: Which business processes are supported by which systems? What are the risks?
  • People: Who are the stakeholders, on both the business and IT side, in a given DR process?
  • Suppliers: Which external suppliers would you need to contact in the event of an IT outage? Your data recovery provider, for example.
  • Locations: Where will you work if your normal premises are rendered inaccessible?
  • Testing: How will you test the DR plan?
  • Training: What training and documentation will be provided to end users?

At the center of your DR plan are two all-important KPIs, which are typically applied individually to different IT services: recovery point objective (RPO) and recovery time objective (RTO). Don’t be confused by the jargon, because they’re very simple:

  • RPO: The maximum age of a backup before it ceases to be useful. If you can afford to lose a day’s worth of data in a given system, you set an RPO of 24 hours.
  • RTO: The maximum amount of time that should be allowed to elapse before the backup is implemented and normal services are resumed.

You can calculate these numbers with our Data Loss worksheet here.

While this testing process may not re-occur as frequently as an evacuation or shelter-in-place drill, be sure that you do re-evaluate the protocols any time there’s a major change in your personnel or your business processes.

Obviously, frequent disaster recovery planning and testing of this magnitude can become a burden on any small business.  As a rule of thumb, recovery plan experts recommend focusing on process failures instead of on specific events when building out your plan.

For most business owners, the ultimate question is not if, but when you’ll be faced with a major emergency or business disruption. That’s why, although disaster preparedness planning is hardly any entrepreneur’s favorite topic, it is of critical importance for any small business that wants to succeed in the long term.

By following these steps to create a thorough disaster preparedness plan for your business, you are making the ultimate investment to make sure that the business you’ve worked so hard to build can continue to thrive for years to come. 

Contact Net Activity and we can help you get the right plan in place today.

Is Your Cloud Solution Going Over Budget?

The cloud is the perfect solution for small- and medium-sized businesses like yours. For a small monthly fee, you get access to cutting-edge technologies and 24/7 support from a team of cloud experts. But without proper management, cloud costs can quickly go over your budget. Here’s what you should do to keep it from becoming too expensive.

Don’t go for standalone services
Standalone services are the biggest price trap in the cloud. Spending on a standalone cloud software may seem harmless now, but if you decide to purchase similar services, the costs can quickly pile up. Then, there’s the issue of integrating these systems together, which costs even more time and money.

The best way around this is to find a service provider that offers a suite of products that work seamlessly together. Platforms like Office 365 or G Suite are great examples, and offer you differently priced packages based on the size and requirements of your business.

Team up with integration experts
If you do need to subscribe to a standalone service, you’ll want to integrate it with the rest of your cloud platform. But if you have limited experience with integrations, mistakes are likely to happen and cause downtime, which will inevitably cost you time and money.

The more economical option is to partner with a cloud integration expert, as they can quickly configure and deploy your systems with zero mistakes.

Understand cloud backup costs
While cloud backups are great for keeping your data secure, you must know how much you’re paying for them. If you plan on storing your data for a long time, you may be charged more. At the same time, if you store more versions of your data, it will cost you more.

One way you can keep costs down is to ask yourself whether certain files even need to be stored in the cloud. Mission-critical files like customer information, legal document, and business plans should be stored in the cloud so you can retrieve them right away after a disaster, but routine documents like timesheets can probably be stored in less expensive data centers.

Remove unnecessary accounts
Most cloud service providers charge you based on the number of users per month, so if you’re not diligent about removing accounts when employees have left your company, you could be throwing your money down the drain.

To avoid this, you need to have deprovisioning procedures in place for when an employee’s contract is terminated. Create a spreadsheet of each employee in your payroll and note down their cloud subscriptions. When an employee leaves your company, you must delete all their business accounts and give the relevant manager access to all their documents.

It’s also a good idea to schedule regular audits to make sure you’re not paying for people who’ve already left your company.

Work with a trustworthy provider
Last but not least, you’ll want to partner with a cloud services provider that not only gives you the best deals on cloud solutions, but also proactively monitors your account and warns you about any issues regarding the computing resources and storage space you’re using.

If you’re looking to keep cloud costs under control, talk to us today. We’re the experts at making the cloud work for each and every client, and we’d love to speak with you about how we can do the same for you!

What Private Browsing Can and Can’t Do

As you surf the web, it’s nearly impossible to keep your internet activity completely private. Certain websites collect personal information for marketing purposes and your browser keeps track of all the websites you visit. But that browsing information can also fall into the wrong hands, which is why you should consider using private browsing if you want to keep your online activities to yourself.

What is private browsing?
Your web browser — whether it be Chrome, Edge, Firefox, Safari, or Opera — remembers the URLs of the sites you visit, cookies that track your activity, passwords you’ve used, and temporary files you’ve downloaded.

This can be convenient if you frequently visit certain pages, can’t remember your login details, or if you’re trying to recall a website you visited a few days ago. But if someone else uses or gains access to your computer, your most private (and embarrassing) internet activities are exposed for anyone to see.

With private browsing — also called Incognito Mode in Chrome and InPrivate Browsing in Edge — all the information listed above does not get recorded. In fact, all the websites and information you accessed in the private browsing session is immediately discarded without a trace as soon as you close the browser. This can come in handy when you’re using a public computer because you’re instantly logged out of all the accounts after closing the window.

Your cookies also won’t be tracked. In a normal browsing session, sites like Facebook will inundate you with highly targeted ads based on the sites and pages you’ve visited. But in private browsing mode, your internet activity won’t be used against you by marketing companies.

Another benefit of private browsing is you can use it to log in to several accounts on the same site, which is useful if you need to log into two different Google accounts at the same time.

Limitations of private browsing
Although private browsing does prevent your web browser from storing your data, it doesn’t stop anyone from snooping on your current activities. If your computer is connected to the company network, system administrators can still keep track of what you’re browsing even if you’re in Incognito Mode.

Also, if spyware or keylogger malware is installed on your computer, hackers will still be able to see what you’re doing online. Even though private browsing has quite a few benefits, you shouldn’t solely depend on it for online privacy.

Your computers must be equipped with Virtual Private Networks that encrypt your internet connection and prevent anyone from intercepting your data. And don’t forget to scan your computer for viruses with a strong anti-malware program to keep spyware and other malicious web monitoring software at bay.

If you want to know where you can get these solutions or learn more about web browser security, contact us today. We have the tools and expert advice you need to prevent anyone from snooping on your internet browsing.

Look for the HTTPS: You Cannot Browse Safely Without It

How many times this month have you paid for something online using your credit card? Was each payment page secured by HTTPS? If you’re not 100% certain, you’re a prime target for identity theft. The padlock icon in your web browser’s address bar is immensely important and it requires your attention.

HTTPS Encryption

Older web protocols lack data encryption. When you visit a website that doesn’t use HTTPS, everything you type or click on that website is sent across the network in plain text. So, if your bank’s website doesn’t use the latest protocols, your login information can be intercepted by anyone with the right tools.

HTTPS Certificates

The second thing outdated web browsing lacks is publisher certificates. When you enter a web address into your browser, your computer uses an online directory to translate that text into numerical addresses (e.g., www.google.com = 8.8.8.8) then saves that information on your computer so it doesn’t need to check the online directory every time you visit a known website.

The problem is, if your computer is hacked it could be tricked into directing www.google.com to 8.8.8.255, even if that’s a malicious website. Oftentimes, this strategy is implemented to send users to sites that look exactly like what they expected but are actually false-front sites designed to trick you into providing your credentials.

HTTPS created a new ecosystem of certificates that are issued by the online directories mentioned earlier. These certificates make it impossible for you to be redirected to a false-front website.

What this means for daily browsing

Most people hop from site to site too quickly to check each one for padlocks and certificates. Unfortunately, HTTPS is way too important to ignore. Here are a few things to consider when browsing:

  • If your browser marks a website as “unsafe” do not click “proceed anyway” unless you are absolutely certain nothing private will be transmitted.
  • There are web browser extensions that create encrypted connections to unencrypted websites (HTTPS Everywhere is great for Chrome and Firefox).
  • HTTPS certificates don’t mean anything if you don’t recognize the company’s name. For example, goog1e.com (with the ‘l’ replaced with a one) could have a certificate, but that doesn’t mean it’s a trustworthy site.

Avoiding sites that don’t use the HTTPS protocol is just one of many things you need to do to stay safe when browsing the internet. When you’re ready for IT support that handles the finer points of cybersecurity like safe web browsing, contact our office or give us a call at 216-503-5150.

How Criminals Are Stealing Your Office 365 Data-And What You Can Do About It

Microsoft works hard to update and secure its full-featured office productivity suite, Office 365. But because it is one of the most widely used office productivity suites in the world (more than 85 million active users worldwide and growing), it is also a target for hackers and thieves.

What can ransomware do to Office 365?

When we think of ransomware in Office 365, we usually think of a program that encrypts or restricts access to critical business systems until a ransom is paid. This is one type of ransomware, and it can cost businesses a lot of money. According to Datto’s 2017 Ransomware Report, 75% of respondents reported their clients suffered business-threatening downtime in the past year.

But ransomware can also be used to steal your data, including your critical data like customer information, research and development, financial data, and other protected information. For example, ransomware may be used to access your confidential trade secrets and threaten to expose them. It may be used to access customer financial information with a threat to sell it on the black market to the highest bidder.
Ransomware in Office 365 can interfere with your business operations or steal sensitive data from your company.

Can ransomware in Office 365 be prevented?

Unfortunately, ransomware is a rampant problem in the business IT environment. A recent survey of 1,100 IT service providers about ransomware and cybersecurity found that 94% reported ransomware infection despite having antivirus software in place. While antivirus and information security platforms can do a lot to help protect your systems from malware, they don’t have a great track record for preventing ransomware in Office 365.

How does ransomware get in?

The genius and the danger (depending on your point of view) of ransomware is that criminals do not need to find a way to penetrate Microsoft’s protection layers to carry out their extortion attack.
Instead, criminals often use social engineering schemes. For example, they can use a phishing scam. Verizon’s 2016 Data Breach Investigation Report revealed that phishing emails have an average open rate of 30%. Download our cheat sheet below to learn exactly what you need to look for (and avoid) in each and every email to protect your identity, money and data.

Your legitimate user (who unknowingly acts as a security vulnerability) gets a message from an address that appears to be legit and in the seemingly official correspondence, they include a Trojan that has a payload disguised as a legitimate file.

What can protect my business from ransomware?

The best protection against ransomware is frequent, reliable, secure data backups. When the data is backed up frequently, old (uninfected) data can be easily restored to replace data that’s blocked or infected with ransomware.
It’s important to note that ransomware, like many other forms of malware, can remain dormant in the system for a period of time before activating itself. Therefore, a backup system should retain several months’ worth of backups in order to provide good protection from ransomware.

Download our free guide to learn more about Office 365 security and Ransomware protection.

Special Year End Pricing !!

Microsoft Teams Rooms Systems For Small/Medium Meeting Room